2025 Combined Bio and Cyberthreats
An Assessment of Biological Weapons: Threat to the United States: Israel is omitted from
annual U.S. arms control non-compliance statements because it has neither signed nor ratified any
of the non-proliferation treaties, including the Biological and Toxin Weapons Convention. It is
also omitted entirely in the US Department of Defenses annual report on proliferation of weapons
of mass destruction, Proliferation: Threat and Response. No mention whatsoever is made of
Israel; in fact, it is not even listed among countries in the report s Middle East section. In any
case, what this means is that since Israel is not a BTWC signatory it is technically not in non compliance,
whatever the status of its BW program may be. However it is clear that South Africa maintained an offensive
BW program in the past, and Israel did so as well, and presumably continues to do so.
Israel has nuclear and chemical weapons, and an offensive BW program.
In September 1997 the Israeli secret service Mossad attempted to assassinate the head of the political
bureau of the Palestinian militant Islamic organization Hamas, reportedly with a lethal dose
of the synthetic opiate fentonyl. Allan Cowell, "The daring attack that blew up in Israel s face," New York
Times, October 15, 1997, p. A8.
is not a signatory of the Biological and Toxin Weapons Convention and is presumed to maintain an offensive
BW program.
Team 4
• Creating a War where the U.S. "attacks itself"
• Our approach results in a covert takeover without involvement against the U.S
military
• Taking advantage of the inherent weakness/fragility/culture of the U.S. social system
• Response to the attack creates infringement upon U.S. freedoms which alienate people
from government (and eventually the military)
• Offer "a way out" (which is advantageous to us), leaving us in "control" of the U.S.
Key Concepts
• The "best" attack is one you (US) does not detect
- Complex systems and "natural stupidity" are difficult to distinguish from
"terrorism"
- Keep US military out of the "problem"
- Put no one in charge (US)
* Confusion between local/state/national governments and agencies as to
"whose problem this is"
• Disabling/non-lethal better than destructive/lethal
• Use existing institutions/companies/trade associations to implement means
- Buried/hidden in code and embedded systems
• Inexpensive to do and potentially profitable
- Requires very few people (Red only "lights the match")
- Technology exists; driven by commercial sector
* Red technology will develop faster (much) than Blue
* Low entry costs
Day 12
LA
- Civil war
- Mayor of LA requests for military aid to replace ineffective ARNG; President
denies request
Day 15
• President asks governors to declare quarantine
- Closes commercial travel
- Several governors refused
* Federal troops deployed to enforce quarantine
* New Hampshire agrees to quarantine but refuses federal troops
• Fire fights between local militia and state troopers
Day 20
- Congress asks for President s resignation
Day 21
• President refuses to resign;
Fourth Week
• Presidential plan fails
- CNN shows footage of robots out of control
• American production plummets
Fifth Week
• US becomes 2nd World Country
• Options
- Red team never announces: don t care
* Red team takes over US industrial production
- Red team never announces: President and cabinet resigns
* Balance of power shifts to more favorable group in Congress
- Red team announces who they are and conditions for surrender
* Control of government
* Or co-opts President
Scenario 1
• HOW TO ATTACK CONUS
- (All of this is based, on the concept of "developing globalization")
- Use "a" multi-national corporation as the aggressor
* A la Krupp and/or Daimler-Chrysler
* The corporation is the cover for our amorality
- Create (or exploit) a natural disaster
- Use position in transportation industry and products
* "Created" traffic accidents to confound response
* Create, or corrupt, national data bases and systems (for distribution
etc.)
* Disrupt the wheel transportation (big truck) system to prevent
distribution of food and other commodities
* "Automate" how to do it so that it is obvious to no one but us
- Corrupt media and network
- Prepare (ITPhase)
* Disinformation and Rumors
• To advance, or counter counter, our purposes
• Corrupt/bend CNN, Reuters, AP, etc.
• Since "anyone, anywhere" can be a reporter use our people to
report "what" we want reported
• Tele-presence spoofers and avatars
* Economic
• We provide transportation (Chrysler)
* Earthquake
• Cause (or wait for) one (or more) in Denver and LA
• "Turn" blame on US government for causing it by weapons
testing (use avatar)
Who apologizes for having done it
Scenario 1 (Continued)
• HOW TO ATTACK CONUS
- Prepare (Damage/Kill Phase)
* Overload the system and cause employment of military assets to
handle "crises"
* Contaminate/block major traffic routes in key areas
• Corrupt data needed to assist in decontamination and recovery
* Give impression of major terrorist activity
• Involve RC forces/FBI/FEMA/SBA
* In ITwar
• Corrupt "some" (not all) critical data (blood supplies, and other)
needed to handle crisis
• Interfere with the crisis C2 organizations, facilities, and
equipment
- Attack
* Employment of Bio weapons/agents
• Venovo virus 5-10 day latency
• Disperse by using public transportation
* Transportation portion of response is compromised
* Telemedicine portion of response is compromised
* Media spoofing creates confusion and distrust
* Miami is a "red herring"
- Done to reduce US to a non-competitor in order to make money
* By definition have to consider what this will cost
• "Go/No Go" decision will be profit based but may have other
reasons also
- Technologies Used
* Minimum Human Maximum Robotic/Automated Involvement
• 5% Human 95% Automated
* Maximum deniability
* Minimize costs/dual use of means
* Take advantage of natural/artificial disasters
• Confusion over who is "Red"
Participant Listing July 2000 Conference Dartmouth College, Hanover, New Hampshire
Participant Listing September 2000 Conference Washington, D.C.
The Institute for Security Technology Studies is a research institute on security technology
studies and is established at Dartmouth to work with the U.S. Justice Department, the
National Domestic Preparedness Office, and other governmental agencies as a principal national
center for cyber-security, infrastructure protection, and related counter-terrorism technology
research, development and assessment.

Pirate Tunes

Pirate Donations

Pirate News TV

Pirate News TV on Charter Channel 6, Knology Channel 6, Comcast Channel 12, ATT Uverse Channel 99, Friday nights 1 am live stream and 24/7 on demand at PirateNews.org and CTVknox.org; Pirate News Radio Show on WBCR 1470 am worldwide live streat at TruthRadio.TV, as seen on History Channel, banned at Gitmo in Support the Troops Tours

KUSF In Exile

Listen to the Pirate Broadcast - Dictator Hussein Obama is stealing college radio stations by paying National Public Radio to bribe hideously overpaid college presidents to secretly sell numerous college radio stations for $3.5-million each. Meanwhile Obama is refusing to allow any new licenses for Low Power FM.